Advances in Cryptology — CRYPTO’ 89 Proceedings

  • Gilles Brassard
Conference proceedings CRYPTO 1989

Part of the Lecture Notes in Computer Science book series (LNCS, volume 435)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Opening session

  3. Why is cryptography harder than it looks?

  4. Pseudo-randomness and Sequences

    1. Agnes Hui Chan, Richard A. Games
      Pages 82-89
    2. Cees J. A. Jansen, Dick E. Boekee
      Pages 90-99
    3. Ueli M. Maurer, James L. Massey
      Pages 100-112
    4. Oded Goldreich, Hugo Krawczyk
      Pages 113-127
    5. Moni Naor
      Pages 128-136
  5. Cryptanalysis and Implementation

    1. Hugo Krawczyk
      Pages 138-153
    2. Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle
      Pages 154-163
    3. Kencheng Zeng, C. H. Yang, T. R. N. Rao
      Pages 164-174
    4. Amos Fiat
      Pages 175-185
    5. Andreas Bender, Guy Castagnoli
      Pages 186-192
  6. Signature and Authentication I

  7. Signature and Authentication II

    1. Ralph C. Merkle
      Pages 218-238
    2. Marijke De Soete, Jean-Jacques Quisquater, Klaus Vedder
      Pages 253-262
    3. Shimon Even, Oded Goldreich, Silvio Micali
      Pages 263-275
  8. Threshold schemes and Key management

    1. Ernest F. Brickell, Daniel M. Davenport
      Pages 278-285
    2. Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang
      Pages 286-298
    3. Benny Chor, Eyal Kushilevitz
      Pages 299-306
    4. Yvo Desmedt, Yair Frankel
      Pages 307-315
    5. Gerald C. Chick, Stafford E. Tavares
      Pages 316-322
  9. Key distribution and Network security

    1. Makoto Tatebayashi, Natsume Matsuzaki, David B. Newman Jr.
      Pages 324-334
    2. Johannes A. Buchmann, Hugh C. Williams
      Pages 335-343
    3. Y. Yacobi, Z. Shmuely
      Pages 344-355
    4. Ruth Nelson, John Heimann
      Pages 356-366
  10. Fast computation

    1. Ernest F. Brickell
      Pages 368-370
    2. P. A. Findlay, B. A. Johnson
      Pages 371-386
    3. Jurjen Bos, Matthijs Coster
      Pages 400-407
    4. Jean-Jacques Quisquater, Jean-Paui Delescaille
      Pages 408-413
  11. Odds and ends

    1. Ivan Bjerre Damgård
      Pages 416-427
    2. Ralph C. Merkle
      Pages 428-446
    3. Spyros S. Magliveras, Nasir D. Memon
      Pages 447-460
  12. Zero-knowledge and Oblivious transfer

    1. Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson
      Pages 498-506
    2. Joan Boyar, René Peralta
      Pages 507-525
    3. U. Feige, A. Shamir
      Pages 526-544
    4. Joe Kilian, Silvio Micali, Rafail Ostrovsky
      Pages 545-546
    5. Mihir Bellare, Silvio Micali
      Pages 547-557
  13. Multiparty computation

About these proceedings


CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key distribution and network security, fast computation, odds and ends, zero-knowledge and oblivious transfer, multiparty computation.


access control authentication cryptoanalysis cryptography cryptology cryptosystems data security digital signature encryption hash function secret sharing

Editors and affiliations

  • Gilles Brassard
    • 1
  1. 1.Département IROUniversité de MontréalMontréalCanada

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1990
  • Publisher Name Springer, New York, NY
  • eBook Packages Springer Book Archive
  • Print ISBN 978-0-387-97317-3
  • Online ISBN 978-0-387-34805-6
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site